Discover Zero Trust Access with Posture Validation
Full zero trust security requires validating the data, device, identity, network, and target application—every time, for every request. Check Point Infinity Identity consolidates user identity data from multiple Identity Providers (Entra ID, Okta, etc.). Infinity Identity adds the ability to integrate the endpoint device security posture provided by 3rd party endpoint agents (including Microsoft Defender, CrowdStrike, etc.). This provides confirmation of device security posture before granting access to internal services, including applications and servers. This also ensures a direct correlation between identity and device posture.
Key Capabilities
- Unified Identity - Consolidates user identities, like Entra ID and Okta, and device data for compliance and posture
- Zero Trust Compliance Checks - Enforces strict inspections for high-risk applications, and alerts or blocks when devices don’t meet policy standards
- Intuitive Monitoring – Provides a single console to view all users, devices, and network events, enabling faster troubleshooting and policy updates
- Cloud Scalability - Start with core identity and device posture, then expand as needed without special architecture or configuration
Participation Requirements
To join the Infinity Identity EA program, your organization must meet the following criteria:
- Be able to use Infinity cloud-based services
- Use Check Point security management solution like Smart-1, Smart-1 Cloud, or running on your own hardware/virtual appliances
- Update your security management to software version R82
- Have security gateways running on either R81.20 or R82
- Use a 3rd party endpoint solution such as MSFT Defender or CrowdStrike
To participate, submit your information above and a Check Point Representative will contact you to get started.
Register for EA Program
Check Point's privacy policy.